Events & Webinars
Register for upcoming events and watch previous events on-demand.
Upcoming Events


Upcoming and Recent Webinars


Optimizing Asset Lifecycle Management
Managing device and software deployments across large organizations is a significant challenge for IT teams today. With a large number of devices connecting to the corporate network remotely, endpoint visibility and control can be inconsistent making the task of assessing device status, deploying the latest patches and application versions fairly arduous. Learn how Absolute’s endpoint visibility and asset intelligence help IT teams in optimizing their hardware and software deployments.


Digital Experience Monitoring: Gain actionable insight
Acquiring real-time granular insights into the performance of your devices, applications, and network is critical to ensuring remote employees can go about their jobs effectively irrespective of where they’re connecting from. This session covers how you can leverage analytics through digital experience monitoring to identify and solve issues to maintain end user experience.


Mitigating Zero-Day Threats
Cyberattacks are becoming more and more sophisticated. AI is a hot topic in the enterprise today -- but is also being leveraged by threat actors. Learn how Absolute Secure Access can protect desk, mobile, hybrid, and field workers alike with state-of-the-art protections -- without having to deploy a new tool.


Transitioning from VPN to ZTNA
VPNs have been the enterprise workhorse for enabling secure remote access to mission-critical applications. But the security landscape is becoming ever more threatening. Learn how you can strengthen your security posture while streamlining mobile and hybrid workforce productivity by layering on Zero Trust Network Access to VPN.


Remote Work Device & Security Risks
In today’s work from anywhere environment, device and security risks can appear from a variety of sources. Devices not being patched, accumulation of sensitive data, and endpoints being misplaced can all have an impact on the organization’s security posture and data risk exposure. Learn how you can utilize Absolute’s endpoint control and remediation capabilities to identify and respond to risks early before they develop into more serious incidents.


New innovation in endpoint security and resilience
Join Our Live Product Update to see new Endpoint Management and Recovery Features.
Discover new and updated Secure Endpoint Editions including Absolute’s new resilience capabilities:
- Rehydrate - Firmware embedded remote recovery of devices
- Patch - OS and 3rd party application Patch Management and Compliance Reporting
- Remediate - Security Exposure Management and Remediation
With:
- Actionable Strategies: Learn how Secure Endpoint can help you meet your security and compliance goals


Application Persistence: How to Secure Your Security
You’ve made a solid investment in IT security. After all, you're not about to let your organization fall prey to cyber threats.
Here's the bad news: those top-rated, ironclad applications you've got securing your endpoints?
They are going to fail.
Causes can range from inadvertent user interference to conflict between competing applications. And whenever a failure occurs, remediation can take days. Or weeks.
If only there was a way to make those critical applications self-healing.
There is.
And our product experts can’t wait to show you how in our latest webinar.